An efficient authentication method for AMBTC compressed images using adaptive pixel pair matching

被引:9
作者
Hong, Wien [1 ,2 ]
Chen, Meijin [1 ]
Chen, Tung Shou [3 ]
Huang, Chien-Che [3 ]
机构
[1] Sun Yat Sen Univ, Nanfang Coll, Dept Elect Commun & Software Engn, Guangzhou, Guangdong, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing, Jiangsu, Peoples R China
[3] Natl Taichung Univ Sci & Technol, Dept Comp Sci & Informat Engn, Taichung, Taiwan
关键词
AMBTC; Image authentication; Adaptive pixel pair matching; APPM; SCHEME; OPTIMIZATION;
D O I
10.1007/s11042-017-4899-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The existing image authentication methods for absolute moment block truncation coding (AMBTC) modify the bits of quantitation levels or bitmaps to embed the authentication code (AC). However, the modification of the bits in these methods is equivalent to the LSB replacement, which may introduce undesirable distortions. Besides, the modification of bitmap for embedding AC reduces the image quality significantly, especially at image edges. Moreover, the existing methods might not be able to detect some special modifications to the marked image. In this paper, we propose an efficient authentication method for the AMBTC compressed image. AC is obtained from the bitmap and the location information, and is embedded into the quantization levels using the adaptive pixel pair matching (APPM) technique. Since the bitmap is unchanged and the APPM embedment is efficient, a high image quality can be achieved. The experimental results reveal that the proposed method not only significantly reduces the distortion caused by embedding but also provides a better authentication result when compared to the prior state-of-art works.
引用
收藏
页码:4677 / 4695
页数:19
相关论文
共 38 条
  • [1] [Anonymous], J INTERNET TECHNOLOG
  • [2] [Anonymous], 1997, Handbook of Applied Cryptography
  • [3] A secure fragile watermarking scheme based on chaos-and-hamming code
    Chang, Chin-Chen
    Chen, Kuo-Nan
    Lee, Chin-Feng
    Liu, Li-Jen
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (09) : 1462 - 1470
  • [4] New image tampering detection and recovery system of JPEG2000 region of interest area
    Chen, J
    Chen, TS
    Cheng, CY
    [J]. IMAGING SCIENCE JOURNAL, 2005, 53 (01) : 12 - 19
  • [5] Coverless Information Hiding Method Based on the Chinese Character Encoding
    Chen, Xianyi
    Chen, Sheng
    Wu, Yulei
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (02): : 313 - 320
  • [6] Chin-Feng Lee, 2011, Journal of Multimedia, V6, P277, DOI 10.4304/jmm.6.3.277-284
  • [7] IMAGE COMPRESSION USING BLOCK TRUNCATION CODING
    DELP, EJ
    MITCHELL, OR
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 1979, 27 (09) : 1335 - 1342
  • [8] Enabling Semantic Search Based on Conceptual Graphs over Encrypted Outsourced Data
    Fu, Zhangjie
    Huang, Fengxiao
    Sun, Xingming
    Vasilakos, Athanasios V.
    Yang, Ching-Nung
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2019, 12 (05) : 813 - 823
  • [9] Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement
    Fu, Zhangjie
    Wu, Xinle
    Guan, Chaowen
    Sun, Xingming
    Ren, Kui
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (12) : 2706 - 2716
  • [10] Structural Minimax Probability Machine
    Gu, Bin
    Sun, Xingming
    Sheng, Victor S.
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2017, 28 (07) : 1646 - 1656